Microsoft Windows has a long history of mass attacks launched at it with exploit kits such as Black Hole and usb spreading. Once the Windows machine is exploited banking bots are installed on that machine. Zeus targeted Internet Explorer and Firefox web browsers. Zeus introduced form grabbing http://en.wikipedia.org/wiki/Form_Grabber and web-injects and ATS attacks using web-injects (http://www.trendmicro.com/cloud-content ... _fraud.pdf). Also Zeus featured vnc (like RDP full gui access to victims machine) and backconnect (allows the botmaster to use the victim’s pc as a proxy andl also to access the victim pc file system). Zeus source code for 2.0.8.9 was leaked.

SpyEye built on Zeus adding support for the web browsers Chrome, Opera.Unlike Zeus SpyEye requires a vps or dedicated server.SpyEye uses collector daemon and requires debian or centos server.SpyEye added screenshots to defeat onscreen keyboards. SpyEye also added dns changer allowing the attacker to change the dns settings of infected computers. SpyEye added webfakes plugin allowed the attacker to intercept and change the page victim machine is viewing. Also DDOS module was added and credit card grabber plugin was added.The hidden rdp plugin is by far the best of SpyEye’s plugins as it uses a hidden Remote Desktop session instead of vnc like zeus.The SpyEye hidden rdp daemon only works with debian or centos. SpyEy also has socks proxy plugin and a ftp plugin both uses the same backconect daemon.

Citadel built off Zeus source code is now the prefered bot by cyber criminals.Citadel is a work in progress checkout http://malware.dontneedcoffee.com/2012/ ... 3.5.1.html for more info on citadel.Why do we still use Windows it’s clearly not secure. This failure rate is not acceptable just assume that your infected.

Okay Linux is secure? Currently linux only concerns are trojans such as Netwire and java trojans.

How can we bank online safely? The answer is using a linux live cd like BT5R3-GNOME-64 wine is loaded on it and read only sd cards to store your passwords and settings on.

First burn the iso and check the md5 sum.Boot the iso and insert the sd cards in write mode download your programs to the sd creat your email account and other accounts usinga password manager such as keepass http://downloads.sourceforge.net/keepas ... -Setup.exeonce finished lock the sd cards into readonly mode.12 Steps to a malware free existence

Not wanting to pull your first post apart, but this seems to be computing for the truely paranoid. Whilst most of it is good advice, in the real world you've got zero chance of getting standard users to take this precautions; I'm an overly paranoid infosec guy and the only step I follow is checking the hash sums of downloaded files - and my machines are malware free (ignoring the malware there deliberately...).

And if you're running a 'nix OS, why run winmd5Free under wine when you've (usually) got md5sum on the commandline as standard?

Thanks for not destroying me on my first post. This was written more toward the power user crowd. I agree standard users will never do this. winmd5Free is simple to use that's why I suggested it but you make a valid point.

Last edited by Hudson185 on Mon Nov 26, 2012 1:05 pm, edited 1 time in total.

Thanks for the post and somethings are really practical and great to implement.

I tend to believe and follow no matter what we do. The moment your are on internet you arent safe.So I keep avoid using windows cause it has a greater number of threats than *nix and OS X and use a VM to download stuff or to visit some random sites.

Andrew Waite wrote:... this seems to be computing for the truely paranoid. Whilst most of it is good advice, in the real world you've got zero chance of getting standard users to take this precautions; I'm an overly paranoid infosec guy and the only step I follow is checking the hash sums of downloaded files - and my machines are malware free (ignoring the malware there deliberately...).

Actually, if it was truely paranoid, he would have said to use something like T.A.I.L.S. instead of Backtrack. has a mode to look like windows, which makes it easier to use for a standard user. Encrypts everything going out. Read only Live CD or USB.

Yes I use T.A.I.L.S. in hostile environments (at the university, and at hacker cons).

But to be honest use specific VMs are better and more cost efficient. Assuming your virtualization software is up to date its really unlikely that malware will "jump the petri dish" as it where. Also Backtrack 5 runs as root on a outdated version of ubuntu with tons of after market modifications i would not use it to do banking under most circumstances

BackTrack 5 maybe out dated but it has Backtrack 5 boot option BackTrack Forensics (http://www.backtrack-linux.org/wiki/ind ... nsics_Boot)As long as you change the default root password it's okay to run as root on a live cd. Provided you power the pc down after each session that should provide more then enough protection.

Are you crazy? It's never a good idea to run as root the hole point of sudo/levels of privilege is to allow for "security in layers" so that way if they compromise the signed in user an attacker does not have free reign of the system they have to find a way to escalate privileges. And it does not matter if it's a forensics boot or not backtrack still is based off of an outdated platform.

Yes live cds have flaws and running as root does have it's drawbacks but because live cd sessions are non-persistent that would require an attacker to re-exploit machine multiple times. These assumptions are reasonable for a power user to follow 99% chance of not getting hacked.

Last edited by Hudson185 on Tue Nov 27, 2012 11:36 pm, edited 1 time in total.

Hudson185 wrote:Yes live cds have flaws and running as root does have it's drawbacks but because live cd sessions are non-persistent that would require an attacker to re-exploit machine multiple times. These assumptions are reasonable for a power user to follow 99% chance of not getting hacked.

That's assuming you're in a diskless system or that the disks are fully encrypted. If neither of those are the case, an attacker could dump hashes, create new autorun entries, etc. There are plenty of possibilities for long-term/persistant attacks.